A Comparative Analysis of Residential and Open Proxies on the Internet J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ... IEEE Access 8, 111368-111380, 2020 | 14 | 2020 |
A computationally-efficient construction for the matrix-based key distribution in sensor network A Mohaisen, NS Jho, D Hong Advances in Information Security and Assurance: Third International …, 2009 | 1 | 2009 |
A cost-effective anomaly detection system using in-dram working set of active flows table: poster R Jang, S Moon, Y Noh, A Mohaisen, DH Nyang Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 1 | 2019 |
A data-driven study of DDoS attacks and their dynamics A Wang, W Chang, S Chen, A Mohaisen IEEE Transactions on Dependable and Secure Computing 17 (3), 648-661, 2018 | 28 | 2018 |
A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments Ü Meteriz-Yıldıran, NF Yıldıran, A Awad, D Mohaisen IEEE VR, 2022 | 20 | 2022 |
A large-scale behavioral analysis of the open DNS resolvers on the Internet J Park, R Jang, M Mohaisen, D Mohaisen IEEE/ACM Transactions on Networking 30 (1), 76-89, 2021 | 12 | 2021 |
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet J Park, R Jang, M Mohaisen, D Mohaisen IEEE/ACM Transactions on Networking (TON), 2022 | | 2022 |
A longitudinal analysis of. i2p leakage in the public dns infrastructure SH Jeong, AR Kang, J Kim, HK Kim, A Mohaisen ACM SIGCOMM Computer Communication Review, 557-558, 2016 | 10 | 2016 |
A Network-independent tool-based usable authentication system for Internet of Things devices C Jung, J Choi, R Jang, D Mohaisen, DH Nyang Computers & Security, 102338, 2021 | 5 | 2021 |
A one-page text entry method optimized for rectangle smartwatches R Jang, C Jung, D Mohaisen, K Lee, D Nyang IEEE Transactions on Mobile Computing, 2022 | 7 | 2022 |
A Privacy-preserving longevity study of Tor's hidden services A Sanatinia, J Park, EO Blass, A Mohaisen, G Noubir arXiv preprint arXiv:1909.03576, 2019 | 8 | 2019 |
A private walk in the clouds: Using end-to-end encryption between cloud applications in a personal domain Y Song, H Kim, A Mohaisen International Conference on Trust, Privacy and Security in Digital Business …, 2014 | 12 | 2014 |
A Robust Counting Sketch for Data Plane Intrusion Detection DHN Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen NDSS 2023, 2023 | 1* | 2023 |
A Scalable and Dynamic ACL System for In-Network Defense C Jung, S Kim, R Jang, D Mohaisen, DH Nyang ACM CCS 2022, 2022 | 6 | 2022 |
A Survey on Deep Packet Inspection for Intrusion Detection Systems T AbuHmed, A Mohaisen, DH Nyang Telecommunication Magazine, 2008 | 130 | 2008 |
A user study of the effectiveness of typosquatting techniques J Spaulding, AR Kang, S Upadhyaya, A Mohaisen 2016 IEEE Conference on Communications and Network Security (CNS), 360-361, 2016 | 4 | 2016 |
ABC: Enabling Smartphone Authentication with Built-in Camera Z Ba, S Piao, X Fu, D Koutsonikolas, A Mohaisen, K Ren 25th ISOC Network and Distributed System Security Symposium (NDSS), 2018 | 42 | 2018 |
Access control for named domain networking A Mohaisen, M Shirvanian, GC Murray US Patent 11,595,398, 2023 | | 2023 |
Access control for named domain networking A Mohaisen, M Shirvanian, GC Murray US Patent 10,887,314, 2021 | | 2021 |
AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics Ü METERIZ-YILDIRAN, NF YILDIRAN, D MOHAISEN ACM CHI, 2022 | 1 | 2022 |